IOC Report
44EPDJT1V8.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\44EPDJT1V8.exe
"C:\Users\user\Desktop\44EPDJT1V8.exe"
malicious

URLs

Name
IP
Malicious
https://steamcommunity.com/my/wishlist/
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://player.vimeo.com
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
necklacebudi.lat
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
aspecteirs.lat
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://store.steampowered.com/steam_refunds/
unknown
sweepyribs.lat
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
sustainskelet.lat
crosshuaht.lat
rapeflowwj.lat
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb
unknown
https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://store.steampowered.com/legal/
unknown
https://community.fastly.steamstatic.com/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli
unknown
https://steam.tv/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
unknown
https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
unknown
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://steamcommunity.com
unknown
energyaffai.lat
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ
unknown
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&amp
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://store.steampowered.com/points/shop
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
grannyejh.lat
https://steamcommunity.com/
unknown
discokeyus.lat
https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l
unknown
There are 73 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
sustainskelet.lat
unknown
crosshuaht.lat
unknown
rapeflowwj.lat
unknown
grannyejh.lat
unknown
aspecteirs.lat
unknown
sweepyribs.lat
unknown
discokeyus.lat
unknown
energyaffai.lat
unknown
necklacebudi.lat
unknown

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5190000
direct allocation
page read and write
malicious
4D11000
heap
page read and write
12FD000
stack
page read and write
390F000
stack
page read and write
1410000
direct allocation
page read and write
D87000
unkown
page execute and write copy
448E000
stack
page read and write
D8D000
unkown
page execute and write copy
1424000
heap
page read and write
557C000
stack
page read and write
F60000
heap
page read and write
3087000
heap
page read and write
5AFE000
stack
page read and write
D13000
unkown
page execute and write copy
55BE000
stack
page read and write
599D000
stack
page read and write
5320000
direct allocation
page execute and read and write
F70000
heap
page read and write
1424000
heap
page read and write
1410000
direct allocation
page read and write
1410000
direct allocation
page read and write
498E000
stack
page read and write
C97000
unkown
page execute and read and write
5150000
heap
page read and write
5300000
direct allocation
page execute and read and write
3F8E000
stack
page read and write
530E000
stack
page read and write
1375000
heap
page read and write
4D11000
heap
page read and write
B00000
unkown
page execute and write copy
4ACE000
stack
page read and write
1380000
heap
page read and write
1410000
direct allocation
page read and write
130A000
heap
page read and write
AA0000
unkown
page read and write
15FF000
stack
page read and write
420E000
stack
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
3080000
heap
page read and write
3A4F000
stack
page read and write
4D11000
heap
page read and write
56BF000
stack
page read and write
1354000
heap
page read and write
3BCE000
stack
page read and write
394E000
stack
page read and write
318F000
stack
page read and write
1424000
heap
page read and write
444F000
stack
page read and write
CD9000
unkown
page execute and read and write
CF7000
unkown
page execute and read and write
4D11000
heap
page read and write
C94000
unkown
page execute and read and write
D2F000
unkown
page execute and read and write
CEB000
unkown
page execute and write copy
4D11000
heap
page read and write
FDE000
stack
page read and write
C87000
unkown
page execute and read and write
5300000
direct allocation
page execute and read and write
36CE000
stack
page read and write
AF4000
unkown
page execute and read and write
1410000
direct allocation
page read and write
46CF000
stack
page read and write
4D11000
heap
page read and write
AA0000
unkown
page readonly
330E000
stack
page read and write
D9C000
unkown
page execute and read and write
494F000
stack
page read and write
32CF000
stack
page read and write
AFF000
unkown
page execute and read and write
4D10000
heap
page read and write
1410000
direct allocation
page read and write
13D3000
heap
page read and write
13D9000
heap
page read and write
1380000
heap
page read and write
51CC000
stack
page read and write
3A8E000
stack
page read and write
5800000
remote allocation
page read and write
1424000
heap
page read and write
344E000
stack
page read and write
3E0F000
stack
page read and write
C7C000
unkown
page execute and read and write
C90000
unkown
page execute and write copy
5300000
direct allocation
page execute and read and write
4BCF000
stack
page read and write
1424000
heap
page read and write
5300000
direct allocation
page execute and read and write
458F000
stack
page read and write
D03000
unkown
page execute and write copy
560D000
trusted library allocation
page read and write
D0F000
unkown
page execute and read and write
173F000
stack
page read and write
D7B000
unkown
page execute and write copy
594E000
stack
page read and write
135B000
heap
page read and write
4C0E000
stack
page read and write
C91000
unkown
page execute and read and write
41CF000
stack
page read and write
D9D000
unkown
page execute and write copy
AE3000
unkown
page execute and read and write
CE0000
unkown
page execute and read and write
5310000
direct allocation
page execute and read and write
1424000
heap
page read and write
C86000
unkown
page execute and write copy
5800000
remote allocation
page read and write
D0C000
unkown
page execute and write copy
AF4000
unkown
page execute and write copy
138B000
heap
page read and write
C71000
unkown
page execute and read and write
4D11000
heap
page read and write
130E000
heap
page read and write
1424000
heap
page read and write
1424000
heap
page read and write
543E000
stack
page read and write
D5B000
unkown
page execute and read and write
AA1000
unkown
page execute and read and write
31CE000
stack
page read and write
301F000
stack
page read and write
5BFF000
stack
page read and write
1424000
heap
page read and write
1424000
heap
page read and write
5330000
direct allocation
page execute and read and write
3F4F000
stack
page read and write
380E000
stack
page read and write
52D0000
direct allocation
page execute and read and write
3E4E000
stack
page read and write
354F000
stack
page read and write
534E000
trusted library allocation
page read and write
55FD000
trusted library allocation
page read and write
5A9E000
stack
page read and write
470E000
stack
page read and write
F0C000
stack
page read and write
1410000
direct allocation
page read and write
480F000
stack
page read and write
3B8F000
stack
page read and write
52F0000
direct allocation
page execute and read and write
3070000
direct allocation
page read and write
1410000
direct allocation
page read and write
1424000
heap
page read and write
1410000
direct allocation
page read and write
139D000
heap
page read and write
1424000
heap
page read and write
139D000
heap
page read and write
4D11000
heap
page read and write
5800000
remote allocation
page read and write
408F000
stack
page read and write
D86000
unkown
page execute and write copy
305C000
stack
page read and write
135B000
heap
page read and write
C74000
unkown
page execute and read and write
37CF000
stack
page read and write
1375000
heap
page read and write
CC6000
unkown
page execute and read and write
4D11000
heap
page read and write
1420000
heap
page read and write
547E000
stack
page read and write
D3D000
unkown
page execute and write copy
CDA000
unkown
page execute and write copy
1400000
heap
page read and write
561B000
trusted library allocation
page read and write
CEE000
unkown
page execute and write copy
430F000
stack
page read and write
4D11000
heap
page read and write
CB1000
unkown
page execute and read and write
1346000
heap
page read and write
4D0F000
stack
page read and write
CF5000
unkown
page execute and write copy
45CE000
stack
page read and write
368F000
stack
page read and write
C5C000
unkown
page execute and write copy
4D11000
heap
page read and write
1424000
heap
page read and write
1337000
heap
page read and write
D86000
unkown
page execute and read and write
4D11000
heap
page read and write
D1E000
unkown
page execute and write copy
D10000
unkown
page execute and write copy
3D0E000
stack
page read and write
2F1E000
stack
page read and write
D20000
unkown
page execute and read and write
1410000
direct allocation
page read and write
C95000
unkown
page execute and write copy
51D2000
direct allocation
page read and write
4A8F000
stack
page read and write
1354000
heap
page read and write
D8D000
unkown
page execute and write copy
4E10000
trusted library allocation
page read and write
1424000
heap
page read and write
1410000
direct allocation
page read and write
52CF000
stack
page read and write
1424000
heap
page read and write
D9C000
unkown
page execute and write copy
1410000
direct allocation
page read and write
CB0000
unkown
page execute and write copy
C92000
unkown
page execute and write copy
3070000
direct allocation
page read and write
C7B000
unkown
page execute and write copy
5605000
trusted library allocation
page read and write
AA1000
unkown
page execute and write copy
40CE000
stack
page read and write
138B000
heap
page read and write
1410000
direct allocation
page read and write
C73000
unkown
page execute and write copy
434D000
stack
page read and write
358E000
stack
page read and write
1300000
heap
page read and write
1424000
heap
page read and write
52E0000
direct allocation
page execute and read and write
4D11000
heap
page read and write
1366000
heap
page read and write
340F000
stack
page read and write
5300000
direct allocation
page execute and read and write
4D11000
heap
page read and write
57FE000
stack
page read and write
AFE000
unkown
page execute and write copy
134F000
heap
page read and write
3CCF000
stack
page read and write
CB9000
unkown
page execute and write copy
56FE000
stack
page read and write
1366000
heap
page read and write
163E000
stack
page read and write
D3F000
unkown
page execute and read and write
1424000
heap
page read and write
5300000
direct allocation
page execute and read and write
D16000
unkown
page execute and read and write
55FB000
trusted library allocation
page read and write
1424000
heap
page read and write
4D11000
heap
page read and write
1424000
heap
page read and write
D06000
unkown
page execute and read and write
D2E000
unkown
page execute and write copy
484E000
stack
page read and write
CED000
unkown
page execute and read and write
D7D000
unkown
page execute and write copy
1410000
direct allocation
page read and write
C5A000
unkown
page execute and read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
CD8000
unkown
page execute and write copy
1424000
heap
page read and write
CF4000
unkown
page execute and read and write
134D000
heap
page read and write
D12000
unkown
page execute and read and write
54FB000
trusted library allocation
page read and write
139D000
heap
page read and write
584D000
stack
page read and write
There are 236 hidden memdumps, click here to show them.